Do My Essay!

Do not waste time. Get a complete paper today.

Our leading custom writing service provides custom written papers in 80+ disciplines. Order essays, research papers, term papers, book reviews, assignments, dissertation, thesis or extensive dissertations & our expert ENL writers will easily prepare a paper according to your requirements.

You’ll get your high quality plagiarism-free paper according to your deadline! No Bullshit!!

Question

1. Question :

Defenders-of-belief communities facilitate activities like:

customer service functions.

manufacturing and operations.

inbound logistics.

sales and marketing.

Question 2. Question :

If the content posted on a social networking site represents reasonable criticism of the organization’s products or services, the best response would most likely be to:

leave it.

edit it.

delete it.

report it.

Question 3. Question :

According to Gossieaux and Moran, which of the following activities are seekers of the truth most likely to facilitate?

Human resources

Operations

Marketing

Sales

Question 4. Question :

Which of the following is one of the principal means that companies implementing Web 2.0 are most likely to use to attract viewers?

Controlled releases

Fixed product value

Free content

Fixed interface

Question 5. Question :

According to Gossieaux and Moran, which of the following observations is true about a hyper-social organization?

It uses social media in an organization-centric manner.

It creates relationships in which only one of the parties perceives and gains value.

It is characterized by a transformation of thinking from market segments to tribes.

It is an organization that transitions from a dynamic process to a structured one.

Question 6. Question :

Which of the following is a risk associated with human resources when using social media to form conclusions about employees?

Loss of privacy of the employees

Loss of control over the employees

Decrease in efficiency of the evaluation process

Possibility of error on the site

Question 7. Question :

Which of the following is a significant risk of using social media for inbound and outbound logistics?

Loss of control

Loss of credibility

Loss of privacy

Loss of effectiveness

Question 8. Question :

According to Gossieaux and Moran, a(n) ________ is an organization that uses social media to transform its interactions with customers, employees, and partners into mutually satisfying relationships with them and their communities.

SM application provider

hyper-social organization

Enterprise 2.0

nonprofit organization

Question 9. Question :

When a student attends a business function for the purpose of meeting people and reinforcing relationships, he or she is investing in his or her:

human capital.

process capital.

social capital.

structural capital.

Question 10. Question :

Which of the following components of McAfee’s Enterprise 2.0 Model involves the creation of enterprise content via blogs, wikis, discussion groups, presentations, etc.?

Search

Authoring

Extensions

Signals

Question 11. Question :

The primary risk of peer-to-peer support in the context of social media and customer service is:

loss of control.

loss of credibility.

lack of privacy.

increase in expenses.

Question 12. Question :

________ is the use of information technology to support the sharing of content among networks of users.

Social media

Content publishing

Multimedia

Programming

Question 13. Question :

Being linked to a network of highly regarded contacts is a form of:

social credential.

viral marketing.

crowdsourcing.

human capital.

Question 14. Question :

Which of the following is an SM application provider?

Oracle

SAP

McAfee

LinkedIn

Question 15. Question :

Social capital, unlike traditional capital:

appreciates with time and never depreciates.

depreciates with time and never appreciates.

sometimes depreciates and at other times appreciates with time.

remains constant with time.

Question 16. Question :

Tasks in the ________ phase of the SDLC include building and testing system components and converting users to the new system.

system definition

component design

system maintenance

system implementation

Question 17. Question :

Which of the following can be represented using the Business Process Modeling Notation?

Gantt charts

As-is models

Scatter plots

PERT charts showing the critical path

Question 18. Question :

The situation where addition of resources creates inefficiencies is known as:

diseconomies of scale.

marginal utility.

marginal returns.

break-even.

Question 19. Question :

In a Business Process Modeling Notation (BPMN) diagram, a ________ symbol represents an activity.

dotted arrow

rectangle

diamond

solid arrow

Question 20. Question :

A ________ is a sequence of activities that determine the earliest date by which a project can be completed.

Venn diagram

Pareto chart

critical path

scatter plot

Question 21. Question :

In a business process, a role refers to:

a physical repository.

the movement of data.

a collection of data.

a collection of activities.

Question 22. Question :

In a business process, resources are:

people or computer applications that are assigned to roles.

collections of procedures and activities.

the total number of points of work that can be accomplished in each scrum period.

collections of related tasks that receive inputs and produce outputs.

Question 23. Question :

Which of the following is true of paired programming?

Two team members write the same program by coordinating from different locations.

Two programs are run simultaneously on one device.

Two processors are required to run one program.

Two team members share the same computer to write a computer program together.

Question 24. Question :

Which of the following are the steps in the business process management (BPM) cycle?

Model processes; implement processes; assess results; create components

Create components; model processes; implement processes; assess results

Implement processes; create components; model processes; assess results

Model processes; create components; implement processes; assess results

Question 25. Question :

The term ________ refers to a set of management policies, practices, and tools that developers use to maintain control over the SDLC project’s resources.

swim-lane layout

trade-off

transmission control protocol

configuration control

Question 26. Question :

The first step in the system definition phase of the systems development life cycle (SDLC) is to:

plan the project.

conduct a feasibility study.

determine the goals and scope.

form the project team.

Question 27. Question :

The traditional process for developing information systems is:

the spiral approach.

the systems development life cycle.

rapid application development cycle.

the V-model.

Question 28. Question :

The first phase of the systems development life cycle (SDLC) is:

defining the system.

implementing the system.

determining the requirements.

maintaining the system.

Question 29. Question :

A ________ is a person who is well versed in an organization’s strategy and focuses on ensuring that business processes and information systems meet the organization’s competitive strategies.

business analyst

business application programmer

business administrator

business supervisor

Question 30. Question :

According to Brooks’ Law, adding more people to a late project will:

guarantee efficiencies.

speed up the project.

create diseconomies of scale.

reduce the need for coordination.

Question 31. Question :

Which of the following is considered a computer crime?

Deletion of records by an employee who is unaware of operating procedures

Poorly written programs resulting in data losses

Loss of data as a result of flooding

Hacking of information systems

Question 32. Question :

Mark is transferring funds online through the Web site of a reputed bank. Which of the following will be displayed in the address bar of his browser that will let him know that the bank is using the SSL protocol?

ftp

www

https

.com

Question 33. Question :

Which of the following systems procedures is specifically the responsibility of operations personnel?

Writing software program codes

Using systems to perform job tasks

Creating back up of system databases

Knowing whom to contact when a security breach occurs

Question 34. Question :

A ________ examines each part of a message and determines whether to let that part pass.

packet-filtering firewall

private key

mail server

drive-by sniffer

Question 35. Question :

In asymmetric encryption, each site has a ________ for encoding messages.

Student Answer: botnet

private key

public key

cookie

Question 36. Question :

Firewalls produce ________ which include lists of all dropped packets, infiltration attempts, and unauthorized access attempts from within the firewall.

honeypots

blogs

activity logs

RSS feeds

Question 37. Question :

Which of the following is likely to be accepted by a poorly designed application, leading to improper disclosure of data?

Public key

Asymmetric encryption

Key escrow

SQL injection

Question 38. Question :

________ is the type of security loss that involves computer criminals invading a computer system and replacing legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing to spy, steal, and manipulate data.

Encryption

Spoofing

Phishing

Usurpation

Question 39. Question :

Which of the following is considered a threat caused by human error?

An employee inadvertently installs an old database on top of the current one

An employee intentionally destroys data and system components

A virus and worm writer infects computer systems

A hacker breaks into a system to steal for financial gain

Question 40. Question :

________ involve the people and procedure components of information systems.

Firewalls

Technical safeguards

Human safeguards

Payloads

Question 41. Question :

________ involves accomplishing job tasks during failure.

Authentication

Hardening

Usurpation

Recovery

Question 42. Question :

A ________ is a number used to encrypt data.

key

honeypot

cookie

cache

Question 43. Question :

With ________, the sender and receiver transmit a message using different keys.

asymmetric encryption

block cipher

symmetric encryption

stream cipher

Question 44. Question :

Removing and disabling ________, which may contain sensitive security data, presents an excellent example of the trade-off between improved security and cost.

bookmarks

pop-ups

cookies

toolbars

Question 45. Question :

When an employee is terminated, IS administrators should receive advance notice so that they can:

destroy the employee’s records.

plan for new recruitment.

disseminate information.

remove the user account and password.

Question 46. Question :

The bullwhip effect:

is not related to erratic consumer demand.

forces distributors, manufacturers, and suppliers to carry smaller inventories that do not have the capacity to meet requirements.

increases the overall profitability of the supply chain.

can be eliminated by restricting access to consumer-demand information to only a few participants in the supply chain.

Question 47. Question :

Which of the following statements is true of a supply chain?

All members of the supply chain of a firm must have close geographical proximity.

Every supply chain should include suppliers, manufacturers, distributors, retailers, and customers.

Each organization in a chain is connected to just one company up and down the chain.

A supply chain includes transportation companies, warehouses, and inventories.

Question 48. Question :

An order processing functional system located in the United States operates in English and reflects the practices and culture of the United States. Its manufacturing systems business partner located in Taiwan, operates in Chinese and reflects the business practices and culture of Taiwan. They do not accommodate language, business, or their cultural differences into a single system. From the above scenario, which of the following statements is true about the functional systems?

The order processing functional system will eventually be forced to operate in Chinese to reflect the business practices and culture of Taiwan.

The use of enterprise systems, such as ERP, would complicate the existing situation and thus increase data isolation.

Lack of integration will be extremely disadvantageous to the manufacturing systems unit but not to the order processing unit.

The systems can operate independently as long as there is an adequate data interface between them.

Question 49. Question :

The principal planning task for an international IS organization is to:

localize software packages to focus on quantity more than quality.

setup IS departments for every process in all of its branches.

integrate the organization’s information systems with the outsourced vendors’ information systems.

align IT and IS resources with the organization’s competitive strategy.

Question 50. Question :

Which of the following components of an IS is the easiest to adapt to internationalization?

Hardware

User interfaces

Procedures

Data

"Order this or a similar essay today!"

Gudwriter Essay Writing

Special offer! Get 20% discount on your first order. Promo code: SAVE20